A method may include receiving, at a first bank system, a report of a fraud event involving an account; receiving, by the first bank system, confirmation of the evidence of fraud; incorporating, by the first bank system, the information to first bank internal fraud controls; and publishing, by the first bank system, an alert to first bank node for the first bank on an information network. A plurality of second bank nodes for a plurality of second banks on the information network receive the alert, a second bank system for each of the plurality of second banks receives confirmation of the evidence of fraud and adds the information to second bank internal fraud controls.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
2.
SYSTEMS AND METHODS FOR GENERATING A STAFFING PLAN
In some aspects, the techniques described herein relate to a method including: predicting, with a machine learning model, a predicted contact volume and a predicted contact duration of customer contacts with a contact center for a future time period; providing input data to a planning application, wherein the input data includes the predicted contact volume, the predicted contact duration, a number of available staff members and a number of available contact time units of each of the number of available staff members; and computing, by the planning application, a staffing plan, wherein the staffing plan minimizes a difference between a total number of predicted customer contact time units and a total number of staff member contact time units for the future time period.
A method may include: receiving, by a smart contract, a request for a random number and a randomness seed from a user; deploying the request as a transaction that is written on a first block in the decentralized ledger; generating, by an oracle, a plurality of pseudorandom quantum circuits using the randomness seed; providing the plurality of pseudorandom quantum circuits to a quantum randomness source, wherein the quantum randomness source executes the quantum circuits and returns a sequence of random bits to the oracle; writing the sequence of random bits to a new block in the decentralized ledger; hashing the sequence of random bits and a block hash for the new block; and returning the hash of the sequence of random bits and the block hash to the user computer program, wherein the user consumes hash of the sequence of random bits and the block hash.
Various methods and processes, apparatuses or systems, and media for dynamically updating of metadata in a data catalog for a change in a data store via a looped configuration are disclosed. The present disclosure provides detecting the change in the data store, automatically pulling, via the data catalog, first metadata corresponding to the change in the data store; automatically generating second metadata corresponding to the change in the data store; updating third metadata stored in the data catalog to incorporate information included in the first metadata and the second metadata for providing updated metadata; and updating a data schema library to reflect the updated metadata, in which the updated metadata and the updated data schema library modify an access control to allow a user group to access the changed data object in the data store.
Aspects of the subject disclosure may include, for example, a processing platform configured to analyze data quality evaluation requirements associated with source data, identify data quality evaluation algorithm(s) based on an analysis of the data quality evaluation requirements, and store metadata relating to evaluation of the source data, and an execution platform configured to receive the data quality evaluation algorithm(s) from the processing platform and execute the data quality evaluation algorithm(s) for the evaluation of the source data to derive data quality metrics, and provide the data quality metrics to the processing platform for storage as the metadata, wherein the processing platform is segregated from the execution platform by network(s), and wherein the execution platform is implemented with in-situ access to the source data such that the source data is withheld from being shared with system(s) outside of the execution platform during the evaluation, thereby ensuring data integrity/locality compliance.
A method may include: a funds control workflow orchestrator computer program receiving, from a money movement platform, a funds control request for a transaction for a client; the funds control workflow orchestrator computer program requesting funding for the request from a liquidity matching computer program; the funds control workflow orchestrator computer program determining whether the request can be funded based on account balances for the client retrieved from an account ledger or an approved credit extension; the liquidity matching computer program generating a liquidity snapshot for the client and storing the liquidity snapshot in an available liquidity snapshot store; the funds control workflow orchestrator computer program receiving a positive determination on liquidity; the funds control workflow orchestrator computer program returning the positive determination to the money movement platform, wherein the money movement platform executes the transaction; and the funds control workflow orchestrator computer program updating a workflow status.
Various methods and processes, apparatuses or systems, and media for mitigating disparities between outputs of different AI/ML models that are subject to usage constraints are disclosed. The method includes: receiving uncertainty values and model quality-related parameter values that are associated with at least two models that are configured to generate a loan price for a loan applicant; receiving feature weight functions that relate to weights of target metrics; calculating model weights for each model; selecting a customized model based on the model weights; receiving a tabular set of personal data that includes individualized financial information and individualized demographic information associated with loan applicants; training the customized model by using the tabular set of personal data, the target metrics, a set of sensitive labels, and historical information that relates to outputs generated by the models; and using the trained model to generate a customized loan price for a loan applicant.
A method and a system for querying database data using natural language are provided. The method includes: receiving, via a user interface, a natural language query to extract domain data from a database; analyzing, using a public cloud platform, the natural language query to determine a first database associated with the natural language query; generating, using the public cloud platform and based on a result of the analysis, a prompt for understanding the first database; transmitting the natural language query and the prompt to a second model that is a large language model (LLM); generating, using the second model and based on the transmitted natural language query and the prompt, a database-specific query; transmitting the database-specific query to the first database; generating, using the first database, a response to the natural language query; and transmitting the response to the user interface.
A system and method for implementing an orchestration of continuous integration and continuous deployment (CI-CD) are disclosed. The method includes receiving a set of data from at least one user to allow access to a developer utility platform and a request to access project data associated with at least one software product. The method includes fetching the project data from at least one database and displaying a plurality of options related to the project data. The method includes creating at least one pull request upon receiving input that relates to the plurality of options. The method includes generating the at least one pull request in case of an absence of a reception of a code freeze request. Next, the method includes implementing a deployment of a change in a code into a target branch from a source branch based on the generated at least one pull request.
Various methods and processes, apparatuses or systems, and media for operating a low latency data store that is designed to provide rapid accessibility to data while ensuring data integrity, consistency, and reliability are disclosed. The method includes: receiving a set of data; storing the set of data in a storage medium; receiving, from a user, a query that relates to the set of data; and providing a subset of the set of data to the user in response to the query. The storage medium includes a non-relational database that implements a Command Query Responsibility Segregation (CQRS) architecture within which a command part performs write operations and a query part performs read operations. The query part is horizontally scaled such that the provision of the subset of the set of data is performable within less than one second of the receiving of the query.
A method may include: receiving a request to deposit an encrypted amount of deposit tokens from an institutional investor; generating a stealth address for the institutional investor; encrypting claims for the institutional investor; posting the encrypted claims to an encrypted claims result smart contract, wherein the encrypted claims are mapped to the stealth address on a privacy-preserving blockchain; establishing the encrypted amount of deposit tokens on-chain at the stealth address; receiving an encrypted amount of a first fund and an encrypted amount of a second fund from the stealth address; and atomically transferring the encrypted amount of the first fund and the encrypted amount of the second fund to the stealth address, and deposit tokens for the encrypted amount of the first fund and the encrypted amount of the second fund to a fund manager for the first fund and a fund manager for the second fund, respectively.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for conducting payment network-less transactions are disclosed. A method may include: receiving, by a computer application executed on an electronic device, payment card information for a payment card; receiving by the computer application, a rule for the payment card from an issuer backend, the issuer backend associated with an issuer of the payment card; communicating, by the computer application and to a merchant point-of-sale device, an indication that a transaction for a good or service will be conducted without using a payment network; receiving, by the computer application and from the merchant point-of-sale device, transaction details for the transaction; decisioning, by the computer application, the transaction by applying the rule to the transaction details; communicating, by the computer application, approval to the merchant point-of-sale device in response to approving the transaction; and sending, by the computer application, payment advice to the issuer backend.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
13.
SYSTEMS AND METHODS FOR PROTECTING SENSITIVE CONTENT DURING REMOTE SPACE SHARING
A method may include: a policy control computer program receiving, from a headset, an anchor identifier for an anchor in response to the headset being proximate to the anchor; (2) the policy control computer program identifying an area in which the headset is located by retrieving the area mapped to the anchor identifier in a mapping of a plurality of anchor identifiers to a plurality of areas; the policy control computer program identifying a streaming policy for the area, wherein the streaming policy restricts audio and/or video streaming from the area, allows audio and/or video streaming from the area, or restricts audio and/or video streaming from the area; the policy control computer program sending, a control signal to the headset based on the streaming policy; and the headset implementing the control signal to control streaming of audio and/or video to the policy control computer program.
A system may include: a first electronic device that receives service classical data and key management system classical data from a first quantum layer, and classical data from a classical data layer, a first multiplexer/demultiplexer that multiplexes the service classical data, the key management system classical data, and the classical data into multiplexed classical data, and the first circulator receives the multiplexed classical data at a first port and routes the multiplexed classical data to a fiber optic channel via a second port. A second circulator at a second electronic device receives the multiplexed classical data from the fiber optic channel on a second port, and routes the multiplexed classical data to the second multiplexer/demultiplexer on a third port, and a second multiplexer/demultiplexer demultiplexes and outputs the service classical data, the key management system classical data, and the classical data.
Various methods and processes, apparatuses or systems, and media for protecting confidential aggregate dataset information when sharing data are disclosed. A receiver receives confidential dataset from a data owner via a communication interface, the confidential dataset including a multi-dimensional privacy data, and being generated from an original distribution of dataset as released distribution dataset. A processor, operatively connected to the receiver, defines a privacy metric as a probability of an attacker guessing the multi-dimensional privacy data by applying a first data processing algorithm onto the confidential dataset; defines a distortion metric of a data release mechanism as worst-case distance between the original distribution dataset and the released distribution dataset by applying a second data processing algorithm; and implements the data release mechanism that minimizes the distortion metric subject to a constraint on the privacy metric for protecting the confidential aggregate dataset information when sharing data.
A method may include: receiving, from a streaming interface, a plurality of words for a first factor in a modular multiplication problem; as each word is received: counting, by a counting module, a number of the plurality of words received; multiplying, by a multiplier module, the word by a second; shifting left, by a left shifter module, an output of the multiplier module; accumulating, by an accumulator module, an output of the left shifter module with a partially reduced output for a prior word; receiving, by the modular reducer module, a modulus and performing partial modular reduction on an output of the accumulator module; providing, by the modular reducer module, an output of the modular reducer module to the accumulator module; and repeating until all words are received from the streaming interface; performing, by the modular reducer module, final modular reduction.
A method may include: a conversational artificial intelligence engine receiving from an augmented reality headset worn by a user, a query including audio and images/video that is made to an embodied interactive agent that is displayed in a display of the augmented reality headset; the conversational artificial intelligence engine generating a prompt for a large language model based on the user utterance and the images or video; the conversational artificial intelligence engine providing the prompt to the large language model; the conversational artificial intelligence engine receiving an output of the large language model, wherein the output comprises text and gestures for the embodied interactive agent; the conversational artificial intelligence engine generating animations for the embodied interactive agent from the gestures and speech for the embodied interactive agent based on the text; and the conversational artificial intelligence engine outputting the animations and the speech to the augmented reality headset.
Systems, methods, and devices for provisioning funding card numbers to merchant wallets are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for provisioning funding card numbers to third party wallets may include: (1) authenticating a customer using an electronic device; (2) redirecting the customer to a third-party website; (3) receiving, from the third-party website and via a first API, a request for funding primary account numbers (FPANs) associated with the customer; (4) providing the third-party website with a plurality of FPAN identifiers for FPANs associated with the customer; (5) receiving, from the third-party website and via a second API, a request for a FPAN associated with a selected FPAN identifier; (6) encrypting the FPAN associated with the selected FPAN identifier; and (7) communicating the encrypted FPAN to the third-party website.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
19.
SYSTEM AND METHOD FOR AUTOMATIC TABLE IDENTIFICATION AND EXTRACTION IN DOCUMENTS
Various methods and processes, apparatuses or systems, and media for automatic table identification and extraction in a document by utilizing one or more processors along with allocated memory are disclosed. The processor receives a variably sized document and streams content of the variably sized document line by line in a sliding window to identify breakpoints. The streaming is independent to the number of tables in the document, or length of the document, and the breakpoints identify start and end of a table. The processor also identifies and extracts a table within the document based on the breakpoints; implements spatially aware parsing algorithm for layout analysis, table constructions, and radial context search from the identified table; and automatically structures the table in structured triplets of index, column, and value that dictates a row, a column, and an entry value, respectively.
Aspects of the subject disclosure may include, for example, obtaining a first set of tags and a first set of descriptions associated with a set of content items, causing an LLM to generate a plurality of tags based on the first set of tags and the first set of descriptions, resulting in a second set of tags, wherein the second set of tags includes the first set of tags and the plurality of tags, and causing the LLM to apply one or more tags from the second set of tags to one or more content items based on information regarding the one or more content items. Other embodiments are disclosed.
A method and a system for issuing news alerts with respect to an entity are provided. The method includes: receiving a news article that relates to at least one entity; extracting, from the input information, signal data; generating a news article electronic document including the news article and the signal data; extracting, from the news article electronic document, a signal quantity for each entity of the at least one entity; generating a time series of signal quantities for the news article; storing each of the news article electronic document and the time series in a database; transmitting the time series to a news alerting model that compares the signal quantity of each entity from the time series to a respective baseline value of the corresponding entity; and generating an alert message when the signal quantity exceeds the baseline value by a predetermined threshold value.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
Aspects of the subject disclosure may include, for example, collecting a plurality of source data having a scope defined by a target regulatory requirement, transforming the plurality of source data to derive decoded responses by applying a set of automated logics that implements a compliance to the target regulatory requirement, converting the decoded responses into machine-readable encoded data required for the target regulatory requirement, and proceeding to encoded data submission to be published to a content administrator and downstream systems of the automated regulatory compliance data package generation system. Other embodiments are disclosed.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
23.
SYSTEMS AND METHODS FOR ANOMALY DETECTION AND DEPLOYMENT FRAMEWORK FOR MAINFRAMES
Disclosed are methods and techniques of detecting network anomalies and responding to the anomalies once detected. The methods, for example, include receiving, by a model executed by a processor, real-time log data of an operating network; parsing, by the model executed by the processor, the log data to identify one or more metrics; determining, by the model executed by the processor, a seasonality of the one or more metrics; determining whether the model should use an autoregressive model if seasonality is detected; and on determining that an autoregressive model should be used, training a model based on determining a grid search for a parameter based on an Akaike information criterion.
Aspects of the subject disclosure may include, for example, receiving communications that originate from a computer used by a user associated with a merchant, wherein the communications comprise credential information that is used to authenticate the user and that corresponds to a role via which the user will perform an action; responsive to receipt of the credential information, authenticating access to a product platform, wherein the product platform is configured to facilitate a plurality of action types; responsive to the authenticating of the access to the product platform and in accordance with the role, selecting as permitted to be performed by the user a particular one of the action types; and facilitating on the product platform the action of the particular action type by the user while concurrently prohibiting an action on the product platform of a different action type by the user. Other embodiments are disclosed.
Apparatus is provided including computer memory configured to hold messages including data structures and configured data. The data structures may comprise a markup language and file format organized in accordance with a tree structure. The data structures may comprise an MX/ISO 20022 messaging format payment file for a sent or received payment. A machine learning (ML) processing circuit is provided that comprises a prediction data input and is configured to receive various messages at the prediction data input and to hold the various messages in the computer memory. The ML processing circuit comprises a message generator configured to generate messages for use in other systems, the generated messages being configured in accordance with the data structures. Per another embodiment, the machine learning processing circuit may be configured to create test messages based on the various messages held in the computer memory.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A method and system for a generative machine learning (ML) framework generating predictive results regarding financial transactions. The method includes generating the generative ML framework by connecting: a base layer; a data processing layer; at least one large language model (LLM) layer; a ML processing layer; and an applications layer. The method further includes executing the generative ML framework by: storing and receiving a first data; performing data processing procedures on the first data resulting in a standardized data, wherein the standardized data includes at least one specific case involving the financial transactions. The operations further include parsing the standardized data to generate analytical results with natural language descriptions; inputting, into the ML processing layer, the analytical results; performing predictive modeling of the analytical results to generate the predictive results; transmitting the predictive results; and generating at least one application model based on the predictive results.
A method may include: receiving an identification of a current incident involving an affected element; generating a first Structured Query Language (SQL) query for recently-implemented change records for the affected element; executing the first SQL query on a database; receiving the recently-implemented change records for the affected element; generating a second SQL query for past incidents that are similar to the current incident; executing the second SQL query on the database; receiving the past incidents that are similar to the current incident, together with associated change records that were identified to be a cause of the past incidents; calculating a relevance score of each recently-implemented change record to the current incident, based on a similarity of the past change records that caused similar incidents; and returning the past change record for the affected element that is similar to the past change record for any element with a highest score.
A system and method for recommending products are disclosed. The method includes: receiving financial data associated with an account of a user; analyzing the financial data to determine a residual amount in the account of the user; recommending, using a recommendation engine, at least one product along with an associated confidence score to the user; receiving user feedback that relates to the recommended at least one product; generating a set of tasks associated with the recommended at least one product upon reception of a positive response from the user; and executing, using an action engine, the set of tasks associated with the recommended at least one product.
Aspects of the subject disclosure may include, for example, obtaining a first state associated with a first microservice that performs a first step in a distributed process comprising a plurality of steps, wherein the first step is one of the plurality of steps; obtaining a second state associated with a second microservice that performs a second step in the distributed process, wherein the second microservice is distinct from the first microservice, and wherein the second step follows the first step; reconciling the first state with first known action data to determine whether a first action indicated by the first state is verified as completed, resulting in a first determination; and reconciling the second state with second known action data to determine whether a second action indicated by the second state is verified as completed, resulting in a second determination. Other embodiments are disclosed.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
30.
Method and system for secure password migration between authentication servers
A method and a system for securely performing a password migration between authentication servers where the password is end-to-end encrypted and hashed are provided. The method includes: after the user has received first and second public keys from the first and second servers, and after the user has stored, in a memory, first and second encrypted versions of the password that are respectively encrypted by using the first and second public keys, transmitting a request to perform an authentication with the first server based on the first encrypted version of the password; after a validated token has been issued by the first server, receiving a request to update the password in the second server based on the token, and transmitting the request to the second server, together with the second encrypted version of the password and a request to migrate the user to the second server.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Various methods and processes, apparatuses or systems, and media for enabling consistent access enforcement across downstream data platforms triggered via an active data catalog are disclosed. A processor implements an active data catalog; causes the active data catalog to receive metadata updates corresponding to a line of business including properties that may be used to control access enforcement across the downstream data platforms; executes a certification process to certify the metadata updates including the properties that may be used to control access enforcement; stores the certified metadata updates onto the active data catalog; updates the active data catalog with the certified metadata updates along with certification details data; and distributes the certified metadata to the downstream data platforms thereby enabling consistent access control enforcement.
A method for implementing a data server network infrastructure maintenance tool within a data server network. The method comprises obtaining an initial data server network configuration, extracting a set of correlations from at least one repository of historical network failure incident information, detecting a first set of failures via at least one telemetry system of the data server network, determining a current state of the data server network via the at least one telemetry system, generating an updated network configuration based on the first set of failures and the current state of the data server network, identifying a second set of components that is likely to fail, and at least one from among preventing and repairing at least one subsequent failure.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for point of sale use for processing and management of payments and receipts, retail inventory management, and website design for brick and mortar and e-commerce merchants; downloadable software for patient and customer billing, payment processing and management, and appointment scheduling software for healthcare providers and other service providers; electronic mobile devices in the nature of multi-functional electronic payment terminals and point-of-sale terminals for reading credit and debit cards, conducting financial transactions, recording financial transactions, reporting financial transactions, and generating email or printed receipts; downloadable software for use as a digital wallet; downloadable software for storing and managing payment credentials and facilitating electronic payments Financial affairs and monetary affairs, namely, financial information, management and analysis services; banking services; banking services, namely, credit and debit card payment transaction processing services for merchants, restaurants, health care providers and other service providers; insurance brokerage services; real estate affairs, namely, real estate brokerage, real estate valuations, real estate investment services; financial transaction and payment services, namely, exchanging money, providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments, issuance of travelers' cheques, financial management; and financial research; digital wallet services; electronic wallet services; providing electronic processing of payments via digital wallets Software as a service (SAAS) services featuring software for point of sale use for processing and management of payments and receipts, retail inventory management, and website design for brick and mortar and e-commerce merchants; software as a service (SAAS) services featuring software for patient or customer billing, payment processing and management, and appointment scheduling for healthcare providers and other service providers; software as a service (SAAS) featuring software for use as a digital wallet
34.
SYSTEMS AND METHODS FOR ENHANCED APPLICATION INTERACTIONS
Systems and methods for enhanced application interactions are disclosed. In one embodiment, a method may include: receiving, by a common process, state information for a first application from the first application executed by an electronic device; storing, by the common process, the state information; receiving, by the common process and from a second application executed by the electronic device, a request for the state information; and providing, by the common process, the state information to the second application.
A method and a system for automatically generating audit records of data transfer events in order to validate data delivery and to facilitate monitoring and compliance with applicable regulations are provided. The method includes: receiving a notification that an event has commenced; obtaining information that relates to the event, including information that relates to a data transfer that occurs in connection with the event and information that relates to an intended destination and an intended timing of the data transfer; submitting, to a records repository, a request for records that relate to the event; receiving the records; comparing the information that relates to the event with the records; generating, based on a result of the comparison, an audit report that relates to the event; and transmitting the audit report to a predetermined destination.
In some aspects, the techniques described herein relate to a method comprising determining an event associated with a threshold probability of causing inaccessibility to an asset; retrieving, by a model executed by a processor and from a database, event data; determining, from a database of a plurality of assets, a set of assets affected by the event based on the event data; generating cause synthetic data related to the event for the set of assets to determine a category for the event based on a location of the event; generating effect synthetic data related to the event for the set of assets; generating a recovery strategy including a response detail based on the cause synthetic data and the effect synthetic data for each asset; generating a risk profile including the response detail for each asset and a probability of the event; and calculating a degree of risk.
Provided is a system that implements a mainframe continuous integration and continuous delivery (CI/CD) pipeline development, the system includes an application programming interface configured to receive data at a mainframe source code repository to enable software applications to communicate with each other via a communication network and a processor, coupled to a memory component and the API. The processor is configured to continuously monitor the mainframe source code repository for the received data to (i) detect a code commit and (ii) identify code components changed responsive to the code commit; synchronize the code commit with a distributed application source code repository; transfer the changed code components to the distributed application source code repository; and trigger, via a web hook, activation of the CI/CD pipeline in response to the transferred changed code components. The triggering occurs automatically when the changed code components are transferred to the distributed application source code repository.
A method and a system for performing real-time fraud detection by proactively identifying fraudulent activity before executing a transaction are provided. The method includes: receiving, from a user, first information that relates to a proposed transaction; providing the first information as an input to a machine learning model; using the machine learning model to generate an output that relates to potentially fraudulent activity associated with the first information; generating, based on the first output, an alert message that includes second information that relates to notifying the user about the potentially fraudulent activity; and transmitting the alert message to the user. The output may include a score that relates to a likelihood that the first information is associated with actual fraudulent activity, and the score may be normalized to fall in a range of between zero and ten.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
39.
SYSTEMS AND METHODS FOR SECURING LOGIN AUTHENTICATION
Systems and methods for securing login authentication are disclosed. In one embodiment, a method may include: (1) receiving, by a mobile application executed by a mobile electronic device, a login from a user; (2) determining, by the mobile application, that secure login authentication is required; (3) prompting, by the mobile application, the user for additional authentication information comprising a personal identification number or a passcode; (4) receiving, by the mobile application, the additional authentication information; (5) comparing, by the mobile application, the additional authentication information to stored authentication information; and (6) presenting, by the mobile application, a landing screen in response to the additional authentication information matching the stored authentication information.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method may include: a unified account service receiving an account creation request and creating an account with an account number; the unified account service mapping the account number to a unique identifier; the unified account service streaming the unique identifier and account data to a unified ledger; the unified ledger creating a unified ledger account that does not identify the account number for the unique identifier and setting an account balance for the unified ledger account for booking periods; a unified postings service receiving a transaction with a transaction booking period for the account; the unified postings service identifying the unique identifier for the account using the mapping; the unified postings service routing the transaction and the unique identifier to the unified ledger, and the unified ledger to updating the account balance for the unified ledger account for the booking period specified by the transaction booking period.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
41.
SYSTEMS AND METHODS FOR DYNAMIC PROCESSING OF A HIGH-VOLUME OF TRANSACTIONS
A method may include a transaction processor: receiving a first transaction for an account; determining that there is not an active high-volume record lock on an account record for the account; acquiring a lock on the account record; receiving a second transaction for the account; attempting to acquire a lock on the account record; determining, in response to being unable to acquire a lock on the account record, that a lock acquire duration exceeds a lock acquire duration threshold; inserting an active high-volume record into a lock table; creating an interim balance record for the account that aggregates transactions received when the active high-volume record is active; receiving a third transaction for the account; determining that an idle duration between the third transaction and the second transaction does not exceed an idle duration threshold; and deleting the active high-volume record from the lock table and the interim balance records.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
42.
SYSTEM AND METHOD FOR SKILL-BASED CONTRACT ASSIGNMENT
Various methods and processes, apparatuses or systems, and media for enabling skill-based contract assignment for completing a particular project are disclosed. A processor trains a model on a set of known criteria data, a plurality of dimensions data, and volume data; and receives a request, via a user interface, from a user to assign the contract for completing the project by selecting criteria determining data. The model applies a weight to the selected criteria determining data; generates a forced-rank list of subject matter experts (SMEs) with rankings and contact information; and transmits the forced-rank list to the user interface. The processor receives user input from the user, via the user interface, establishing an agreement to select an SME from the forced-rank list; transmits an electronic message to the selected SME to accept the agreement; and sets the agreement into a contract on a blockchain to ensure accuracy and encryption.
A method and a system for generating scripts that are usable for automatic construction of application programming interfaces (APIs) in an accurate, efficient, and streamlined manner are provided. The method includes: receiving, from a user, a set of requirements for an API; automatically generating, based on the requirements, a script that is usable for constructing the API, such as a Structured Query Language (SQL) script; retrieving, from a database based on the script, a set of data items that is usable for constructing the API; automatically constructing the API based on the script and the data items; and outputting the API to a terminal associated with the user.
A method and system of computer-automated detection of personally identifiable (PI) data in electronic data are provided. The method includes: receiving the electronic data including the PI data and transmitting the electronic data to a modifiable hash algorithm in a first computing environment. The method further includes generating, by the modifiable hash algorithm, hashed electronic data via masking the PI data; comparing, by a PI detector service function algorithm in a second computing environment, first electronic data fields of the received electronic data including the PI data with second electronic data fields of the hashed electronic data including the masked PI data in order to detect a match indicating a presence of unmasked PI data between the first and second electronic data fields; generating, by the PI detector service function algorithm, a result with a confidence level based on the comparison; and outputting the result with the confidence level.
Various methods and processes, apparatuses or systems, and media for computing a fair market value of a bond are disclosed. A processor generates a table where all weight vector associated with a pricing prediction value of the bond at a given time received from a plurality of data sources are included therein; receives weight vector as input corresponding to the bond from the table; and computes a loss function for each of the plurality of data sources individually, wherein each loss function includes a first part and a second part, the first term indicates a distance very closer to a real value of the price at which the trade was executed compared to the second part which is a term that penalizes predictions for being further away from the real value; and computes a fair market value of the bond based on the loss function.
Various methods and processes, apparatuses or systems, and media for transaction level pricing and balance management are disclosed. A processor receives a plurality of transactions associated with a card; enriches the plurality of transactions by consuming external transaction data associated with each transaction, populating preconfigured internal attributes data, and outputting enriched transactions; publishes the enriched transactions for executing a transaction level pricing and balance management algorithm; consumes the enriched transactions; identifies type of each transaction from the consumed enriched transactions by applying predefined rules; and executes, for each type of transaction, the transaction level pricing and balance management algorithm to perform the following operations at transaction level at the time of transaction posting instead of balance level calculations at cycle time: fee calculations, interest charge calculations, payment allocations, payment reversal processing, balance management at transaction level, service customers with intra cycle financial estimates, remove account processing at accumulated balance level.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
47.
METHOD AND SYSTEM TO MANAGE PERSONALLY IDENTIFIABLE INFORMATION IN A DOCUMENT
There are provided methods and systems for retrieval and management of target information in one or more files. For example, there is provided a system that includes a processor and memory including instructions which, when executed by the processor, can cause the processor to perform certain operations. The operations can include receiving a file and categorizing the file into one or more components. The operations can further include extracting a machine-readable arrangement from the one or more components and detecting target information from the machine-readable arrangement. Further, the operations can include modifying the target information and assembling an output file including the modified target information.
A system and method for providing content-based assessments are disclosed. The method includes receiving a request from a user device to initiate a process for at least one property. Further, the method includes obtaining a plurality of media items captured from a construction site of the at least one property at predefined time intervals. Further, the method includes loading the media items into a trained model for performing an analysis, the analysis includes comparing the media items with a set of input data corresponding to a virtual representation of the property. Further, the method includes generating a first report and a second report related to a construction progress and a construction quality, and a third report based on the first report and the second report. Thereafter, the method includes transmitting a recommendation based on the third report, to a device to process the request.
Systems and methods for using display-enabled transaction cards are disclosed. A display-enabled transaction card may include: a substrate; a display on the substrate; an interface that may be configured to receive a card feature to display on the display; and a controller that may be configured to display the card feature on the display. A method may include: (1) receiving, by a controller of a display-enabled transaction card and via an interface on the display-enabled transaction card, a card feature, wherein the card feature may include card art, a reward status, or an account status; and (2) displaying, on a display of the display-enabled transaction card, the card feature.
Systems and methods for providing stateless management of a virtualization platform are disclosed. In some aspects, the techniques described herein relate to a method including: listening, at an agent executing on a host machine of a plurality of host machines that include a cluster for hosting virtual machines, for an event triggered on a virtual machine manager associated with the agent; determining, by the agent and based on the event, parameters needed for an API call at a central management service that manages a plurality of virtual machines and virtual machine managers; sending a Hypertext Transfer Protocol (HTTP) request to the central management service, wherein the parameters are included in the HTTP request; receiving, by the agent and from the central management service, a response to the HTTP request including return data based on the determined parameters and the API call.
Systems and methods for enhanced conversational performance of large language models using adaptive retrieval-augmented generation are disclosed. A method may include: (1) receiving a query from a user; (2) retrieving a plurality of summaries of historical conversations from a database of historical conversation summaries similar to the query; (3) generating a first prompt comprising the query and the plurality of summaries; (4) submitting the first prompt to a first large language model (LLM); (5) receiving, from the first LLM, a first response; (6) presenting the first response to the user; (7) generating a second prompt for a summary of the query and the first response; (8) submitting the second prompt to a second LLM; and (9) saving a second response to the second prompt from the second LLM to the database of historical conversation summaries, wherein the second response comprises the summary.
Aspects of the subject disclosure may include, for example, capturing data by a first communication device associated with a data producer, signing the data with a signing key resulting in signed data, encrypting the signed data according to an encryption key resulting in encrypted signed data, and storing the encrypted data in a storage device. Further, the embodiments can include receiving, over a communication network, a request associated with the data from a second communication device associated with a data consumer, and providing, over the communication network, the encrypted signed data to the second communication device. The second communication device receives the encrypted signed data, decrypts the encrypted signed data according to a decryption key resulting in the decrypted signed data, and authenticates the decrypted signed data. Other embodiments are disclosed.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
In some embodiments, techniques described herein relate to a method including: receiving a user instruction at an application executed by an electronic device; generating, at a framework executed by a server, one or more feature groups based on the profile data; generating, at the framework, a data configuration file; generating, at the framework, a model configuration file; specifying, at the framework, a sequence of functionality steps for execution; generating, at the framework, a prediction score based on the sequence of functionality steps; saving and/or executing, at the framework, the sequence of functionality steps; and generating, at the electronic device, one or more outputs including, for example, a prediction based on the sequence of functionality steps.
In some aspects, the techniques described herein relate to a method including: receiving, by a collaboration service, location data of a user, wherein the location data includes a timestamp; verifying, by the collaboration service and based on a digital itinerary associated with the user, a location of the user; processing data from a data profile associated with the user as input data to a machine learning model; receiving, by the collaboration service and as output of the machine learning model, a plurality of predicted travel objective classifications; determining, by the collaboration service, a plurality of travel objectives, wherein each of the plurality of travel objectives is associated with one of the plurality of predicted travel objective classifications; determining, by the collaboration service, a travel objective within a predefined proximity of the location of the user; and displaying the travel objective to the user via a planning interface.
G01C 21/28 - NavigationNavigational instruments not provided for in groups specially adapted for navigation in a road network with correlation of data from several navigational instruments
G01C 21/36 - Input/output arrangements for on-board computers
55.
METHOD AND SYSTEM FOR IMPROVING CODE GENERATION QUALITY OF LARGE LANGUAGE MODEL THROUGH CODE GUARDRAILS
A method and a system for improving a quality of software code generated by using a large language model (LLM) via code guardrails are provided. The method includes: receiving a request for performing a task; providing the request as an input to the LLM; receiving, from the LLM, a first set of executable code that is intended to be usable for performing the task; automatically executing the first set of executable code in an environment that includes at least one guardrail component that is configured to detect errors; detecting at least one error, such as a hallucination error, based on a result of the execution; determining at least one feedback item based on the at least one error; and prompting the LLM to generate a second set of executable code based on the request, the first set of executable code, and the at least one feedback item.
A method for computing regional counterfactual rules to summarize recourse options is disclosed. The method includes receiving model data via an input, the model data including information that relates to a target model and a corresponding data set; training a surrogate model for the target model based on the model data; identifying, by using the surrogate model, rules for an output of the target model based on a predetermined threshold, the rules including a counterfactual rule; enumerating, by using the surrogate model, boundaries for the identified rules to partition an input space into a grid with cells, each of the cells including a hyperrectangular cell; labeling, by using the surrogate model, each of the cells with one of the identified rules based on predetermined optimality criteria; and merging, by using the surrogate model, each of the labeled cells based on a matching of the rules to generate regions of optimality.
An apparatus is provided including storage encoded computer executable code for a consolidated enterprise application configured to provide, to a select set of users with credentialed private access to the consolidated enterprise application, web-based access in a form of a given user experience. In select embodiments, the given user experience involves providing access to user interface static content. The consolidated enterprise application comprises plural frontend web-based independent user interface (UI) unit applications. More specifically, the UI unit applications are individual uncontainerized micro frontends. One or more content publishing interfaces may be provided, that are configured to publish content including the code to a web service storage. The one or more content publishing interfaces are configured to use application programming interface requests to publish the content to the web service storage.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
58.
SYSTEMS AND METHODS FOR GENERATING JOINTLY CERTIFIABLE RANDOMNESS AND PROVIDING JOINTLY CERTIFIABLE RANDOMNESS VIA PUBLICLY-CERTIFIABLE RANDOMNESS BEACONS
A method may include: selecting, by a plurality of classical parties, each of the classical parties using a classical party computer program, a distributed randomness protocol; generating, by the plurality of classical parties, a random string using the selected distributed randomness protocol; providing, by one of the classical parties, the random string to a quantum party, wherein the quantum party executes a quantum party computer program in communication with a quantum randomness source; executing, by the quantum party, a certified randomness protocol with the quantum randomness source using the random string as an input; receiving, by the quantum party, quantum randomness comprising a sequence of random bits from the quantum randomness source; and verifying, by the classical parties, that the random string was randomly selected, and that the quantum randomness is a valid output of the certified randomness protocol using the random string as input.
A method may include: generating, by a plurality of auditor computer programs and a data curator computer program, a first random string using a first distributed randomness protocol; sending the first random string to a quantum party computer program; executing, by the quantum party computer program, a certified randomness protocol with a quantum randomness source using the first random string; receiving, from the quantum randomness source, a first quantum randomness; generating, by the auditor computer programs and the data curator computer program, a second random string using a second distributed randomness protocol; extracting, by the data curator computer program and using a randomness extractor, a second quantum randomness from the first quantum randomness using the second random string, wherein the second quantum randomness comprises a near-uniformly random string; and executing, by the data curator computer program, a differential privacy protocol using the second quantum randomness as additive noise.
Payment cards with activated information displays are disclosed. In one embodiment, a payment card may include: a first layer; a second layer comprising an elastic material; an actuator; and an information layer between the first layer and the second layer, comprising: a plurality of information voids; and a microfluidic channel that communicates the plurality of information voids with the actuator. A fluid may be provided in the microfluidic channel such that when the actuator is depressed, fluid flows into the information voids making the information voids visible through the second layer, and when the actuator is released, the fluid flows out of the information voids making the information voids substantially invisible through the second layer.
A method may receive a text string of an utterance. A method may tokenize the utterance into a plurality of tokens. A method may transform the plurality of tokens into a plurality of feature vectors. A method may assign an entity label to each of the plurality of feature vectors. A method may resolve each feature vector of the plurality of feature vectors to a corresponding standardized value of a database query language.
A method and a system for automatically migrating projects of a computing product in phases for a version upgrade are provided. The method includes: receiving at least one input relating to projects of the computing product; identifying, based on the at least one input, at least one project of the first version of the computing product to be migrated; deploying a first intermediate instance for the first version of the computing product; copying at least one first data file of the identified at least one project from a source instance to the first intermediate instance; importing the identified at least one project from the at least one first data file into the first intermediate instance; modifying the first intermediate instance to a second intermediate instance for the second version; copying at least one second data file; and importing the at least one identified project of the second version.
Systems and methods for federated model validation and data verification are disclosed. A method may include: (1) receiving, by a local computer program executed by client system, a federated machine learning model from a federated model server; (2) testing, by the local computer program and using a policy service, the federated machine learning model for vulnerabilities to attacks; (3) accepting, by the local computer program, the federated machine learning model in response to the federated machine learning model passing the testing; (4) training, by the local computer program, the federated machine learning model using input data comprising local data and outputting training parameters; (5) identifying, by the local computer program using the policy service, accidental leakage and/or contamination by comparing the training parameters to the input data; and (6) providing, by the local computer program, the training parameters to the federated model server.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A system and method for assessing a quality of a data fabric are disclosed. The method includes: receiving a plurality of input data products from at least one data source into the data fabric; and transmitting the plurality of input data products to a quality scoring engine for assessing the quality of the data fabric based on an analysis of each of the plurality of input data products. The analysis includes receiving a plurality of scoring parameters, rule definitions, and a metadata for each of the plurality of input data products; calculating a respective data offering quality score against each of the plurality of scoring parameters during the lifecycle of the plurality of input data products; generating a data fabric quality scoreboard based on an aggregation of the respective data offering quality scores calculated for each of the input data product; and displaying the data fabric quality scoreboard.
A method may include: receiving a plurality of log-text examples from network devices and labels indicating if the log-text example is anomalous or not anomalous; identifying, from the log-text examples and labels, rules for weak annotation, and validation labels for a validation dataset and test labels for a test dataset; organizing log-text examples in the validation dataset into a plurality of time windows; concatenating log-text examples in each time window; providing the concatenated log-text examples and the rules for weak annotation to a weak annotation framework, to a LLM training dataset; training a LLM with the LLM training dataset; collecting runtime log-texts from the network devices for a period of time; concatenating the runtime log-texts for the period of time; and prompting the LLM for analysis with the concatenated log-texts, wherein the LLM outputs a response of anomaly or no anomaly and a confidence in the response.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
66.
SYSTEMS AND METHODS FOR MOBILE DEVICE PAYMENT USING TAP
Systems and methods for mobile device payment using tap are disclosed. In one embodiment, a method may include: reading, by a mobile application executed by a mobile electronic device, a machine-readable code comprising an embedded link to a provider website at a uniform resource locator (URL) provided by a provider of a good or service for a transaction involving the good or service; accessing, by the mobile application, the URL; receiving, by the mobile application and from the provider website, a payment by tap option; wirelessly receiving, by the mobile application, payment information from a physical financial instrument; providing, by the mobile application, the payment information to the provider website; and receiving, by the mobile application and from the provider website, confirmation of payment for the transaction.
A laser level target post for leveling a server cabinet. The laser level target post includes an elongated body section extending in a longitudinal direction, the elongated body section having an external surface that extends in the longitudinal direction, a reflective surface at a top end of the external surface of the elongated body section, wherein the top end reflective surface is operable to reflect a received light beam for leveling a top surface of the server cabinet, and a magnetic base at a bottom end of the elongated body section, wherein the magnetic base is operable to attach the laser level target post to a corner of the top surface of the server cabinet such that the longitudinal direction extends vertically.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
45 - Legal and security services; personal services for individuals.
Goods & Services
Charge cards, credit cards, chip cards, electronic data carrier cards, and payment cards; magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes Promoting the use of credit cards through the administration of incentive benefits, privileges, consumer loyalty programs, and the offering of exclusive programs and promotions to cardmembers Issuance of credit cards; credit card services, namely, credit card verification, financial administration of credit card accounts, and processing of credit card annual fees, transactions, payments, and merchant refunds Personal concierge services for others comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs rendered to cardmembers
69.
SYSTEMS AND METHODS FOR INTEGRATED DIGITAL WALLET PAYMENTS
Systems and methods for integrated digital wallet payments are disclosed. Embodiments may store and manage the lifecycle of assets in a digital wallet and may provide artificial intelligence and/or machine learning based recommendations to provide the optimal frictionless and rewarding consumer authentication and payment experience. Embodiments may leverage blockchain technology that provides a single consumer solution with decentralized wallet ownership and a data-driven network orchestration for optimal payments. Embodiments securely store the payment instruments and may provide personal usage recommendations for the optimal outcome based on, for example, consumer preferences.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system and method are provided for image-based login and authentication. The system displaying a plurality of random images to a user; receiving from the user a selection of at least one target image from the plurality of random images; generating a hash number for the at least one target image; generating an encrypted identification token; and associating the encrypted identification token with the user. The hash number identifies the at least one target image. The encrypted identification token includes the hash number.
G06F 21/36 - User authentication by graphic or iconic representation
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
71.
SYSTEMS AND METHODS FOR DETECTION OF HALLUCINATION IN LARGE LANGUAGE MODELS
Systems and methods for detection of hallucination in large language models are disclosed. According to an embodiment, a method may include: (1) receiving, by a computer program, a plurality of input texts, wherein each input text is a prompt for a large language model (LLM) and may include a slight perturbation from an initial input text; (2) generating, by the computer program and for each of the plurality of input texts, an input embedding vector; (3) providing, by the computer program, each input text to a large language model (LLM); (4) receiving, by the computer program and for each input text from the LLM, an output text; (5) generating, by the computer program and for each of the plurality of output texts, an output embedding vector; and (6) generating, by the computer program, a hallucination metric based on the input embedding vectors and the output embedding vectors.
Various methods and processes, apparatuses or systems, and media for deterministically deriving underlying graph structure and associated text information in a document are disclosed. A processor implements a vision-based algorithm and a network-based algorithm that may extract and structure a diagram from an image obtained from the document. The processor deterministically derives underlying graph structure and associated text information in the document by applying the vision-based algorithm and the network-based algorithm, thereby allowing encoding of graph content and reasoning into downstream applications including LLM inputs, graphical question-answering, and information extraction tasks. The processor also implements OCR algorithm for text fields, and then isolates which piece of text belongs to which node by examining the spatial coordinates of the text against bounding box of the node and executes cross-page resolution.
G06V 10/46 - Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]Salient regional features
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
73.
METHOD AND SYSTEM FOR DETECTION AND MITIGATION OF ARTIFICIAL INTELLIGENCE HALLUCINATIONS
Methods and systems for detecting and mitigating hallucinations in artificial intelligence (AI) summarizations of user-generated content are provided. The method includes: receiving an AI-generated content item; retrieving historical content items that have been generated by human beings; comparing the AI-generated content item with the historical content items in order to determine whether text string matches are present; when a determination is made that no match exists, performing a semantic matching operation to identify text strings included in the historical content items that are semantically similar to text strings in the AI-generated content item; and determining, based on the comparison and the semantic matching operation, whether the AI-generated content item is a hallucination. When a hallucination is detected, the hallucination may be mitigated by removing a textual perturbation and/or replacing the textual perturbation with text that accurately reflects the original content item.
Systems and methods for generating synthetic training data are disclosed. A method may include: (1) receiving user speech from a user; (2) generating an input file comprising text of the user speech; (3) extracting entities from the text in the input file; (4) creating an input data structure for a data structure for the entities, wherein the input data structure comprises a plurality of columns, a column name for each column, a data attribute for each column, and a data type for each column, and a number of records based on a volume parameter; (5) converting the data type for each column to an ANSI SQL-standard data type; (6) generating a database agnostic data structure having the column names and the ANSI SQL-standard data type; (7) generating synthetic data for the database agnostic data structure; and (8) outputting an output file comprising the synthetic data.
Systems and methods for verification by tap are disclosed. In one embodiment, a method may include: receiving, by a computer program executed by an electronic device and from a mobile application executed by a mobile electronic device, an action selected by a user; determining, by the computer program, that the action is a sensitive action; causing, by the computer program, the mobile application to display an instruction to present a wireless-enabled device to the mobile electronic device; receiving, by the computer program and from the mobile application, device information that was received wirelessly from the wireless-enabled device; validating, by the computer program, the device information; and executing, by the computer program, the sensitive action in response to the device information being validated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
76.
SYSTEMS AND METHODS FOR IN-PERSON INTERACTIVE SHOPPING
Systems and methods for in-person interactive shopping are disclosed. In one embodiment, a method may include: (1) identifying, by a computer program, a customer that is present in an area; (2) monitoring, by the computer program, a location of the customer in the area; (3) receiving, by the computer program and from a sensor near the location of the customer, a customer movement associated with removing an item from a shelf; (4) identifying, by the computer program, the item; (5) predicting, by the computer program, that the customer has removed the item from the shelf; (6) adding, by the computer program, the item to a virtual shopping cart for the customer; (7) decreasing, by the computer program, a stored inventory of the item; and (8) charging, by the computer program, the customer for the item.
Systems and methods for configuration driven integration of services in business process models agnostic of a workflow system are disclosed. An exemplary method includes receiving, at a service executor, a generic service call from a business process management notation (BPMN), wherein the generic service call includes a service name parameter, wherein the service name parameter is associated with a service task of the BPMN, and wherein the service name parameter is associated with a service. The service executor can construct a call to the service including required data from a transient data store. The service executor can then receive return data from the service, store the data in the transient data store and respond to the BPMN that the service task has been completed.
Systems and methods for protecting vulnerable persons from fraudulent activity are disclosed. A method may include: (1) receiving, by a computer program executed by an electronic device, a transaction involving a person having a registered guardian; (2) determining, by the computer program, that the transaction requires guardian consent from the registered guardian; (3) communicating, by the computer program, a notification comprising a code to a registered guardian electronic device associated with the registered guardian; (4) receiving, by the computer program and from the person, the code; and (5) executing, by the computer program, the transaction in response to receiving the code.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
79.
SYSTEM AND METHOD FOR GENERATING COMPETING MODELS IN RASHOMON SETS FOR GRADIENT BOOSTING
A method may include: receiving a dataset comprising a plurality of samples and a loss function; training a first number first machine learning models using the dataset comprising, wherein each of the first machine learning models has a similar performance; selecting one of the first machine learning models with a smallest loss; computing a residual for each of the plurality of samples using the one first machine learning model; defining a new dataset comprising the plurality of samples and the residual for each samples; training the first machine learning model with the new dataset; generating a second plurality of machine learning models by repeating the selecting, the computing, the defining, and training for a number of boosting iterations; selecting a subset of the second plurality of machine learning model models having a specified property; and deploying the subset of second machine learning models to a downstream task.
Systems and methods for decentralized recovery of identity attributes are disclosed. In one embodiment, a method for decentralized storage of identity data may include: (1) receiving, at an identity management computer program executed by a computer processor, identity data from a user electronic device; (2) parsing, by the identity management computer program, the identity data into a plurality of portions; (3) mapping, by the identity management computer program, each portion to one of a plurality of storage locations; and (4) storing, by the identity management computer program, the plurality of portions to the plurality of storage locations based on the mapping.
Systems and methods for conducting composable quantum oblivious transfer over noisy quantum channels are disclosed. Embodiments provide a method for constructing a quantum oblivious transfer (QOT) protocol using noisy quantum channels and devices through the use of a quantum-hard one-way function. This construction allows the construction of QOT protocols that achieve simulator security, allowing them to be used in a black-box fashion as part of other cryptographic constructions, including arbitrary secure multiparty computations.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Providing temporary use of online, non-downloadable software for facilitating the issuance, management, transfer, and settlement of deposit tokens and other digital or virtual blockchain-based payment instruments representing funds held with a financial institution; Software as a service (SaaS) featuring technology for enabling payments, settlements, and programmable transactions using deposit tokens and other digital assets on public and private blockchains; Providing online non-downloadable software for integrating deposit tokens with traditional bank accounts and financial systems; Providing online non-downloadable software for account-to-account transfers of deposit tokens representing funds held with a financial institution; Software as a service (SAAS) services featuring software for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Platform as a service (PAAS) featuring computer software platforms for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Software as a service (SAAS) services featuring software for recording and exchanging financial and non-financial data and information via a cryptographic ledger; Providing temporary use of non-downloadable software for facilitating peer-to-peer and institutional payments, cash management, and liquidity optimization using digital or virtual blockchain-based payment solutions; Providing temporary use of online non-downloadable software for accessing, reading, and tracking information in the field of financial transactions on a blockchain; Providing temporary use of online non-downloadable software for financial transactions on a blockchain; Providing temporary use of online non-downloadable software for processing electronic payments; Providing online non-downloadable software for data storage and certification using blockchain technology; Providing online non-downloadable software for managing smart contracts using blockchain technology; Electronic storage of deposit tokens and other digital or virtual blockchain-based payment instruments for others; Electronic storage of data related to financial transactions using blockchain technology for others; Providing online non-downloadable software for enabling secure access to, and transactions from, digital wallets associated with blockchain-based payment solutions; Providing online non-downloadable computer software for use as a digital wallet or electronic wallet; Design and development of computer software relating to deposit tokens, digital currency, virtual currency; Providing authentication, security, and trust services for blockchain-based payment solutions; Data encryption services, namely, electronic monitoring of personally identifying information to detect identity theft via the internet
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of online, non-downloadable software for facilitating the issuance, management, transfer, and settlement of deposit tokens and other digital or virtual blockchain-based payment instruments representing funds held with a financial institution; Software as a service (SaaS) featuring technology for enabling payments, settlements, and programmable transactions using deposit tokens and other digital assets on public and private blockchains; Providing online non-downloadable software for integrating deposit tokens with traditional bank accounts and financial systems; Providing online non-downloadable software for account-to-account transfers of deposit tokens representing funds held with a financial institution; Software as a service (SAAS) services featuring software for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Platform as a service (PAAS) featuring computer software platforms for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Software as a service (SAAS) services featuring software for recording and exchanging financial and non-financial data and information via a cryptographic ledger; Providing temporary use of non-downloadable software for facilitating peer-to-peer and institutional payments, cash management, and liquidity optimization using digital or virtual blockchain-based payment solutions; Providing temporary use of online non-downloadable software for accessing, reading, and tracking information in the field of financial transactions on a blockchain; Providing temporary use of online non-downloadable software for financial transactions on a blockchain; Providing temporary use of online non-downloadable software for processing electronic payments; Providing online non-downloadable software for data storage and certification using blockchain technology; Providing online non-downloadable software for managing smart contracts using blockchain technology; Electronic storage of deposit tokens and other digital or virtual blockchain-based payment instruments for others; Electronic storage of data related to financial transactions using blockchain technology for others; Providing online non-downloadable software for enabling secure access to, and transactions from, digital wallets associated with blockchain-based payment solutions; Providing online non-downloadable computer software for use as a digital wallet or electronic wallet; Design and development of computer software relating to deposit tokens, digital currency, virtual currency; Providing authentication, security, and trust services for blockchain-based payment solutions; Data encryption services, namely, electronic monitoring of personally identifying information to detect identity theft via the internet.
84.
METHOD AND SYSTEM FOR IDENTITY BROKERAGE FOR CLOUD ACCESS
There are provided methods and systems for cloud access control. For example, a method is provided as instructions on a non-transitory computer-readable medium. The instructions may be configured to cause a processor to perform certain operations. The operations can include receiving information about a connecting entity, and the connecting entity seeking to establish a connection to a cloud environment. The operations can further include determining, based on a policy, one or more attributes associated with the connecting entity. The operations may also include partitioning the cloud environment, according to one or more attributes.
Aspects of the subject disclosure may include, for example, receiving, from a transaction terminal, a request for reference IDs, based on the receiving, providing, to the transaction terminal, a proof-of-work problem for the transaction terminal to solve, after the providing, receiving, from the transaction terminal, a solution to the proof-of-work problem, performing one or more actions to verify the solution, based on successful verification of the solution, transmitting a range of reference IDs to the transaction terminal, thereby enabling the transaction terminal to utilize the range of reference IDs in relation to transaction processing. Other embodiments are disclosed.
Methods and systems for computing input attributions to accurately explain predictions of decoder-only sequence classification models are provided. The method includes: receiving a set of inputs to the decoder-only sequence classification model; generating, based on the first set of inputs, a perturbed version of the set of inputs; sampling a binary mask from a predetermined masking distribution; generating a group of masked versions of the perturbed set of inputs by applying the binary mask to the perturbed set of inputs; generating, based on the group of masked versions of the perturbed set of inputs, corresponding sets of intermediate predictions that correspond to the decoder-only sequence classification model; computing, based on the sets of intermediate predictions, a set of input attributions; and determining, based on the set of input attributions, an explanation that relates to a prediction of the decoder-only sequence classification model.
Various methods and processes, apparatuses or systems, and media for evaluating LLMs on time series feature understanding are disclosed. A processor implements a pre-trained LLM; generates a comprehensive taxonomy for evaluating analytical capabilities of the LLM in a context of time series data, the comprehensive taxonomy including a feature and a corresponding sub-category of the feature. In evaluating analytical capabilities of the LLM in the context of time series data, the processor determines whether the LLM can detect the feature; and when it is determined that the LLM can detect the feature, determines whether the LLM can identify the sub-category of the feature; automatically generates a feature detection and classification score for the LLM indicating performance time series information retrieval and arithmetic reasoning performance measured by accuracy for different time series; and displays the score onto a graphical user interface.
Systems and methods for providing governance as finite state machines are disclosed. A method may include: a computer program in a compute environment: (1) receiving state machine definitions for a plurality of state machines; (2) saving the state machine definitions in a graph database; (3) receiving an event from one of a plurality of governed systems or a peer computer program in a peer compute environment, an event; (4) querying the graph database for one of the state machine definitions for the event; (5) instantiating a state machine instance using the state machine definitions; (6) executing a transition based on a current state; (7) receiving an instruction from the state machine; and (8) sending the instruction to one or more of the governed systems; wherein the one or more governed systems implement the instruction.
A system and method for providing an automated ticket resolution are disclosed. The method includes registering at least one queue owner upon successful completion of an onboarding of the at least one queue owner. The method includes receiving a ticket data from the at least one queue owner, the ticket data comprises data associated with a plurality of tickets and corresponding resolution of the plurality of tickets. The method further includes loading the ticket data into a data repository to train a model for the automated ticket resolution. The method includes receiving at least one ticket via a ticket management platform. The method further includes identifying a resolution for the at least one ticket using the model trained from the ticket data. The method includes executing the identified resolution to resolve the at least one ticket.
In some aspects, the techniques described herein relate to a method including: receiving, at a change request service, a request to update contact information data; receiving, at the change request service, from a verification service provider, a raw ownership score; normalizing, by the change request service, the raw ownership score; sending, by the change request service, the contact information data, the customer identifier, and the normalized ownership score to a risk engine; receiving, by the change request service from the risk engine, a confidence score; providing, by the change request service, the confidence score, the normalized ownership score, and historical data associated with the stored customer profile, to a consolidation function; receiving, by the change request service and from the consolidation function, a consolidated trust score; and updating a datastore record associated with a customer represented by the customer identifier with the contact information data.
A method and a system for using a large language model (LLM) to automatically translate textual instructions into executable software code via skill distillation and composition are provided. The method includes: receiving a request for performing a task and a prompt; providing, as an input to an LLM, the first request and a response to the prompt; receiving, from the LLM, a set of code that implements a function that corresponds to a skill that is usable for performing the task; generating a test that relates to the task; performing the test by executing the set of code and checking whether the task has been successfully completed; and when the task has been successfully completed, storing the set of code in a skills library. Sets of code stored in the skills library may then be accessed and combined in order to perform larger tasks.
Various methods and processes, apparatuses or systems, and media for data processing are disclosed. A processor implements an AI powered bot system; receives, via a user interface within the bot, user input as text data wherein the text data indicates a RFQ for a derivative instrument; transmits the text data to an AIML NLP service; extracts, by a parsing module, parameters associated with the RFQ by utilizing an entity extraction model provided by the AIML NLP service; normalizes the extracted parameters and transmits the normalized parameters to an automated pricing module; receives pricing details data by a response generation component embedded within the parsing module from the automated pricing module; and transmits the pricing details data to the bot for receiving user input via the user interface to conduct a transaction with respect to the derivative instrument.
A method may include: (1) receiving, at a computer program, such as a mobile banking application, executed by an electronic device, a request to disable a feature of the computer program, such as a payment feature, for a time period; (2) disabling, by the computer program, the feature; (3) determining, by the computer program, that the time period has passed; and (4) enabling, by the computer program, the feature. The feature may be disabled by removing an icon to access the feature, and may be enabled by adding the icon to access the feature. The method may also include: monitoring, by the computer program, a location of the electronic device; determining, by the computer program, that the electronic device is in a registered location; and enabling, by the computer program, the feature even if the time period has not passed.
H04M 1/72463 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
H04M 1/72403 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
H04M 1/72457 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
A method may include: an access management service receiving a client credential from a client; the access management service generating a bearer token for the client electronic device and communicating the bearer token to the client electronic device; a blockchain integration service receiving a remote procedure call with the bearer token from the client electronic device; the blockchain integration service validating the bearer token with the access management service; the blockchain integration service receiving, from the access management service, a client profile comprising the client credential; the blockchain integration service determining that the remote procedure call is a contract create call; the blockchain integration service submitting the contract create call to a blockchain network; and the blockchain integration service adding the client and/or the contract to an allow list, wherein the allow list identifies clients that are allowed to access the contract on the blockchain network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Various methods, apparatuses, systems, and media for implementing endpoint detection and response and data protection correlation are disclosed. A correlation engine receives a data stream from multiple sources and one or more patterns. A processor analyzes the data to relate an event to the one or more patterns and executes a policy when the event matches the one or more patterns to identify suspected encrypted data files. The processor transfers the suspected encrypted data files and an encryption key to a controlled testing environment to use the encryption key to safely decrypt the suspected encrypted data files and to test the suspected encrypted data files to determine a potential network impact of executing each of the suspected encrypted files on the network. The processor detonates, from the controlled testing environment, the suspected data files confirmed during the testing to have a negative impact on the network.
A method for providing a tool for individualized financial planning and navigation that is tailored to user preferences and offers flexibility with respect to modifications in financial goals is provided. The method includes: receiving information that includes a financial goal of a user; applying an optimization algorithm that is designed to analyze the information with respect to the financial goal; and using a result thereof to determine an achievable percentage of the financial goal of the user and recommendation(s) for modifying the information in order to increase the achievable percentage of the financial goal. The information further includes a number of time steps for achieving the goal, a first amount of money that the user contributes per time step towards the goal, and a second amount of money that the user expects to save by the end of the time steps.
Various methods and processes, apparatuses or systems, and media for automating development, testing, and productionizing a pipeline for users are disclosed. A processor receives a request from a user to access an application, the request including user's credentials data; grants access to the application based on verifying the user's credentials data with prestored credentials data received by calling an authentication server; identifies the user's role within a computing environment; automatically presents a template that corresponds to the user's role allowing the user to write code to source data either by bringing the user's own data into the computing environment or by connecting to data that resides in a database; automatically integrates the written code with a continuous integration continuous delivery pipeline for production of a model; and deploys the model after training and testing the model while managing and maintaining all necessary guardrails from a control standpoint within the computing environment.
A method may include: an access control computer program receiving a third-party registration comprising a biometric from a third party; the access control computer program receiving an asset owner registration comprising an identification of a physical asset, an identification of a physical asset access control device that controls access to the physical asset, and an identification of the third party to access the physical asset; the access control computer program receiving, from the physical asset access control device, a biometric from the third party; the access control computer program comparing the biometric received from the physical asset access control device to the biometric in the third-party registration; and the access control computer program instructing the physical asset access control device to grant access to the physical asset in response to the biometric received from the physical asset access control device matching the biometric in the third-party registration.
A method and a system for using a skipping mechanism to automatically detect out-of-distribution (OOD) inputs to neural networks in an efficient and accurate manner are provided. The method includes: receiving a proposed input to a neural network at a first gate of the neural network; estimating, based on an output generated by the first gate, a first probability that the proposed input is classifiable as being OOD; forwarding the first proposed input to at least one additional gate of the neural network, including skipping at least one layer of the neural network; estimating, based on a respective output generated by each respective additional gate, a corresponding probability that the proposed input is classifiable as being OOD; and determining, based on the estimated probabilities, whether the proposed input is classifiable as being OOD by determining whether at least a minimum number of the estimated probabilities exceed a predetermined threshold.
Aspects of the subject disclosure may include, for example, receiving information regarding a plurality of jobs, assigning the plurality of jobs to a plurality of workers in accordance with a base schedule, wherein the base schedule is derived by solving an initial scheduling model that is configured to facilitate job assignments based on worker availability, capabilities, skills, experience, or a combination thereof, while reducing or minimizing job completion time and maintaining a determined balanced load, detecting one or more disruptions or events after the assigning, and causing the base schedule to be repaired based on the detecting, wherein the causing involves solving a scheduling repairing model that is configured to repair an existing schedule based on detected disruptions or events, while reducing or minimizing an impact of the detected disruptions or events on the existing schedule. Other embodiments are disclosed.